šŗļø Series: Overview ⢠Part 1: Recognizing Scams (current page) ⢠Part 2: Essential Tools ā ⢠Part 3: Network Security ā ⢠Part 4: Daily Habits ā
ā ļø Disclaimer
Iām not a certified security professional or lawyer. Iām just sharing my experience and security habits - things I try to follow myself and urge my mom to practice as well. This is not a professional security consultation, nor a legal advice. Your situation may differ. When in doubt, consult with qualified paid professionals.
The most sophisticated security tools in the world wonāt help if people fall for scams. The weakest link in security is almost always the human. Hackers know this, which is why they spend more time trying to trick people than trying to break through firewalls.
This post covers the most important skill in cybersecurity: recognizing when someone is trying to manipulate us.
šÆ Golden Rule
If something sounds too good to be true, it probably, most likely, definitely - is.
1. I Trust My Gut Feeling
Remember āFloor is Lavaā? Thatās how I treat suspicious emails.
Email & Phishing Red Flags
- I donāt open suspicious emails and links. Phishing attacks are the #1 way hackers get into accounts.
- Gmail and Outlook catch most spam, but theyāre not perfect. I still check everything.
- I check if Iāve been hacked: I visit Have I Been Pwned every few months to see if my email/password leaked in any data breaches.
What I Tell My Mom to Look For
Red flags in emails:
- Misspelled sender addresses (amazom.com instead of amazon.com)
- Generic greetings (āDear Customerā instead of my name)
- Urgent threats (āYour account will be closed in 24 hours!ā)
- Unexpected attachments or links
- Grammar mistakes in āofficialā emails
š Key Trick
Hover your mouse over links (donāt click!) to see the real destination. If it looks suspicious, it probably is.

2. If It Sounds Too Good to Be True, It Probably Is
I donāt trust messages on the Internet - Facebook, LinkedIn, X (Twitter), WhatsApp, Instagram, TikTok, whatever.
Scammers use social engineering - psychological manipulation to trick people into trusting them.
Common Social Engineering Tactics Iāve Seen
āYou won the lottery!ā - No, they didnāt. āClick here to claim your prize!ā - I tell Mom: donāt click. āYour friend sent you money!ā - Did they though? I call them directly. āHot singles in your area!ā - Classic scam. āThis one weird trickā¦ā - Nope.
People who fall for these might as well be buying the Brooklyn Bridge.
3. When Iām Not Sure About Something
If I have doubts about an email or attachment, hereās what I do:
- Scan it with my antivirus
- Check it with VirusTotal (free file scanning service)
- Ask someone tech-savvy
- I donāt open it until Iām sure itās safe

š Real Attack
My friendās company lost $50,000 because someone in accounting opened a fake invoice attachment. The invoice looked perfect - same format, logo, everything. The only difference? The email address was off by one letter.
4. What I Never Give Out
This is so important, I told Mom twice.
I Never Share
- Passwords
- Social Security Number (SSN)
- Credit card info
- Bank account numbers
- Security question answers
- One-time codes sent to my phone
Especially Important
-
If the call was unsolicited - What I do: I never trust inbound calls about security. If āmy bankā calls me, I hang up and call them back using the number on the back of my credit card.
-
Only use PUBLICLY published contact info - I only call numbers from the back of my credit card or the bankās official website. Random 800 numbers? Nope.
-
Security questions - Iām careful not to post security question answers on social media (school name, petās name, hometown, etc.).
š Lock This Down
Banks never ask for passwords, PINs, or full card numbers. If someone claiming to be from my bank asks for these, I know itās a scam.
5. Are You Bernie Madoff?

If not, chances are the FBI, IRS, and Royal Canadian Mounties are NOT after you.
If They Are Actually After You
They will:
- Come knocking with a warrant (and maybe a SWAT team)
- Send a certified letter via USPS
- Contact you through official channels
They Will NOT
- Call over a staticky international line with a robo-call
- Ask for SSN, birth certificate, or personal info over the phone
- Accept payment via credit card or Zelle transfer
- And they will definitely not ask for Target or Walmart gift cards
š© Red Flags
- Robo-calls claiming to be from government agencies
- Threats of immediate arrest or legal action
- Demands for immediate payment
- Requests for gift cards or wire transfers
- Pressure to act quickly without thinking
What I do: Hang up. Look up the official number. Call them back.
6. What I Made Mom Repeat Out Loud
āI do not give out any security information.ā
I made her say it twice.
Yeah, it sounds silly. But it works.
Real-World Examples Iāve Seen
The Grandparent Scam
Someone calls claiming to be a grandchild, saying theyāre in jail and need bail money. They sound panicked. They beg people not to tell their parents.
What I told Mom: Hang up and call me directly. Or call the āgrandchildā at their real number.
The Tech Support Scam
āThis is Microsoft calling. Your computer has a virus. We need remote access to fix it.ā
What I told Mom: Hang up. Microsoft doesnāt call random people. Neither does Apple.
The Package Delivery Scam
āYour package couldnāt be delivered. Click this link to reschedule.ā
What I do: I go directly to the shipping companyās website. I never click links in texts.
Teaching This to My Mom
Hereās how I explain social engineering to my mom:
āMom, scammers are like really good salespeople. They make you feel urgency, fear, or excitement so you act without thinking. The moment you feel rushed to make a decision, STOP. Thatās when theyāve got you.ā
We have a code word. If something feels off, she sends me the code word and I call her immediately to talk through it.
What Iād Do First If Starting Over
If I were starting fresh, hereās what Iād focus on first:
- Check Have I Been Pwned - I do this quarterly for my email
- Delete suspicious emails - I went through my inbox and cleared out anything sketchy
- Talk to elderly family members about phone scams - I had this conversation with Mom, and it paid off
- Set up a code word system - Mom and I use this for security emergencies
Next in Series
Part 2: Essential Security Tools ā
Learn about the TWO most important security tools everyone needs: password managers and two-factor authentication. These two things protect people from 80% of attacks.
More Resources
- FTC: How to Recognize and Avoid Phishing Scams
- CISA: Avoid Social Engineering and Phishing Attacks
- AARP Fraud Watch Network - Great for elderly family members
Last updated: January 31, 2025